
ii
MON08 Cyclone User Manual
P&E
Microcomputer
Systems, Inc.
4.1
4.2
4.3
STAND-ALONE PROGRAMMER CONFIGURATION.............................................35
MON08 Cyclone Buttons ............................................................................................................ 33
MON08 Cyclone LED Indicators................................................................................................ 33
Example....................................................................................................................................... 34
5
5.1
5.2
5.3
5.4
5.5
5.6
5.7
5.8
5.9
PC-HOSTED DEBUG/PROGRAMMING SOFTWARE..............................................40
Command Line Parameters.......................................................................................................... 36
Port Pin Settings........................................................................................................................... 36
Baud Rate and Security Settings.................................................................................................. 37
Target Power Down/Up Delay in Milliseconds........................................................................... 37
Specify Programming Algorithm and S-Record.......................................................................... 38
Programming Operations............................................................................................................. 38
Image Description........................................................................................................................ 39
Save Image................................................................................................................................... 39
Stand-Alone Operation Procedure............................................................................................... 39
6
6.1
6.2
6.3
P&E Microcomputer Systems Software...................................................................................... 40
Metrowerks Software................................................................................................................... 43
Target Connection And Security Dialog ..................................................................................... 48